This is a proof of concept exploit for the DRCATD remote exploit vulnerability. It allows an attacker to execute arbitrary code remotely.
An attacker can exploit this issue to download arbitrary attachment files within the context of the affected application.
The CygniCon CyViewer ActiveX control is prone to a vulnerability caused by an insecure method. Successfully exploiting this issue will allow attackers to create or overwrite files within the context of the affected application (typically Internet Explorer) that uses the ActiveX control. Attackers may execute arbitrary code with user-level privileges.
Attackers can exploit this issue to cause the server to dereference an invalid memory location, resulting in a denial-of-service condition. Due to the nature of this issue arbitrary code-execution maybe possible; however this has not been confirmed.
Joomla! CMS is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker can exploit these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
The 'Pretty Link Lite' plugin for WordPress is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
The MySQLDriverCS application is prone to an SQL-injection vulnerability because it fails to properly sanitize user-supplied input before using it in an SQL query. A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.
This module exploits a stack overflow in the NaviCopa HTTP server 2.01 (release version 6th October 2006 or earlier). It is not the same vulnerability as the one described in BID 20250. The vulnerability allows reliable code execution. The only thing that may vary is the path to the NaviCopa installation folder. On an English version of Windows, it resides in the c:program filesnavicopa directory. In that case, eip is overwritten with char 271 to 274. To add a new target version of Windows (e.g. Spanish, Italian etc.), you only need to change the offset to eip. As an example, in a German version of Windows, the installation directory of navicopa is c:programmenavicopa. As a result, the path length is four characters shorter than on an English version of Windows. As a consequence, the offset to eip ha
The Ubisoft CoGSManager ActiveX control is prone to a remote stack-based buffer-overflow vulnerability due to a lack of proper bounds checking on user-supplied input. Attackers can exploit this vulnerability to execute arbitrary code within the context of an application, typically Internet Explorer, that uses the ActiveX control. Failed exploit attempts will result in a denial-of-service condition.
Mambo CMS is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker can exploit these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.